Results 1 to 3 of 3

Thread: The Most Common Security Myths

  1. #1
    Join Date
    May 2008
    Posts
    346

    The Most Common Security Myths

    In the world of Windows security and Internet connection, there is not only a range of practical advice, but also myths and half.
    Let's take a look at the most.


    1. Antivir is an absolute uselessness, I will not risk

    In a number of discussion forums, you may experience the following sentence: "I never used Antivir and vira not." Whatever is on the claims of any amount of truth, your antivirus program should become an essential defensive rampart immediately after installing Windows. As the firewall and Windows Defender (the default in Vista) fulfill your but against viruses and malicious code in all its "beauty" certainly neochránÃ*. And even though the number of users behaving very careful, infection with the virus can never be excluded. If you do not want to spend as antivirus, use for domestic and non-commercial purposes, for example, AVG Anti-Virus Free and avast! Home.


    2. When I surf safe, do not use Internet Explorer

    The default Internet Explorer is logically one of the most popular targets of different experiments and the misuse of remote attack. Absolutely not but that the transition to Firefox, Opera or any other alternative to immediately annul all the risks. Any browser is imaginary internet gateway, and thus may become a means of downloading malicious code or abuse, for example, installed the add-on.


    3. Blocking outgoing traffic significantly increases the safety


    On a firewall blocking outgoing traffic is often very strong emphasis, but this function when a user actually appreciate? Usually, after the system is infiltrated and the malicious code is trying to send data, respectively. contact other potential victims. In such a case may be blocking outbound communications practice, but in general, certainly not the most important elements of defense computer.


    4. Having a strong password, the protected data safe

    This rule may apply for certified algorithms that have undergone internal testing and the principle is known - it is a normal practice and the strong encryption, which is in a strong password virtually. But it certainly does not apply to all programs or operating systems, where the encryption algorithm is one big unknown, and which therefore may be password protected access, but no date as such. Although a strong password is used, often can not be ruled out various options circumvent or use other ways to obtain the first protected data.

    5. If the web address begins with https, it is safe


    Abbreviation https means that communication with the remote server Encryption, a data path that can not normally read. It is also one of the reasons why use https all the sites that transmit sensitive information (online banking, transaction confirmation, Web bets, etc.). Generally should not be automatically considered as a site completely safe, because communication via protected connections only indicate confirmation certificate and "agreement" in our browser to the remote server to encrypt conditions. Just to realize how many times you who actually read the initial server certificate offered, instead, to be swiftly confirmed ...

  2. #2
    Join Date
    Dec 2007
    Posts
    280

    Re: The Most Common Security Myths

    If an attacker wants on some servers, usually to nedeľa virus, other than the targeted attack on the weaknesses of the system. And clearly thrives. If you ever become, of people really massive changes to the Linux OS will be Linux community strasne wonder.

  3. #3
    Join Date
    May 2008
    Posts
    256

    Re: The Most Common Security Myths

    Check outgoing communication is essential to be optional in terms of security of personal data. If you have a computer, where your basic office software, it is one - if you like testing demo, freeware and shareware, very happy to know that the application communicates, and whether you want to communicate, for example when you run the system, etc.

Similar Threads

  1. What are the common problem in using more than one antivirus
    By Aakarshann in forum Networking & Security
    Replies: 9
    Last Post: 28-08-2012, 10:18 AM
  2. What are the myths of Watercooling
    By Dvimida in forum Hardware Peripherals
    Replies: 8
    Last Post: 21-10-2011, 10:53 PM
  3. Common Myths busted about the Motorola Droid 3
    By Lyalisai in forum Portable Devices
    Replies: 5
    Last Post: 21-07-2011, 08:30 PM
  4. What are common fittings of all Watercoolers
    By Planetty in forum Hardware Peripherals
    Replies: 5
    Last Post: 19-05-2011, 11:32 PM
  5. How to avoid common wifi security issues
    By Akiraa in forum Tips & Tweaks
    Replies: 2
    Last Post: 08-05-2011, 08:38 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,750,668,197.96456 seconds with 16 queries